Standards  >   Security Standards  >  

Cryptography Standards

RSS Feed   
Cryptography Standards Reports
 
Leading Canadian Bank Achieves Compliance for Themselves and their Customers
sponsored by Comforte AG
CASE STUDY: To achieve PCI compliance while reducing the risk of data breaches and potential fraud, a Canadian bank implemented comforte's platform which replaced sensitive data with tokens to render it unreadable anywhere stored. In this case study, explore the benefits the bank saw after implementing comforte.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

Decryption Powered by the Gigamon Visibility Fabric with GigaSMART
sponsored by Gigamon
RESOURCE: Learn how the Gigamon Visibility Fabric with licensed GigaSMART Decryption can enable operations teams to have full visibility into encrypted traffic on any TCP port or application.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Gigamon

Managed File Transfer Category Report
sponsored by Help/Systems
ANALYST REPORT: Selecting a managed file transfer software can be overwhelming and one of the biggest challenges facing organizations is understanding the marketplace. In this research report, explore a comprehensive list of 9 managed file transfer vendors to help you find the best fit for your organization.
Posted: 13 Feb 2020 | Published: 31 Mar 2019

Help/Systems

Our First ‘Ask Eric Anything’ Webinar Addresses Users’ Security & Privacy Concerns
sponsored by Zoom Video Communications
RESOURCE: As part of Zoom’s commitment to creating a safe meeting experience for their users, Zoom founder and CEO Eric S. Yuan has started hosting weekly “Ask Eric Anything” webinars. In this blog, explore some of the specific questions Eric answered during the first webinar session.
Posted: 05 Jun 2020 | Published: 08 Apr 2020

Zoom Video Communications

Executive Brief: The Dark Side of Encryption
sponsored by SonicWall
WHITE PAPER: Encryption plays a key role in providing security for digital interactions. However, these encryption protocols can also serve as a lucrative vector for cybercriminals, allowing them to gain easy access to networks. This white paper explores how (and why) organizations should decrypt traffic in order to identity and mitigate potential threats.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

EU GDPR Compliance Puts Focus on Data Tracking, Encryption
sponsored by Ivanti
EGUIDE: In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.
Posted: 05 Sep 2017 | Published: 31 Aug 2017

Ivanti

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide from SearchSecurity.com takes an in-depth look at what Certificate Authorities and digital certificates do for secure web browsing and explores what trusted SSL certificates and forged SSL certificates mean to your business.
Posted: 16 May 2013 | Published: 16 May 2013

GeoTrust, Inc.

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance
sponsored by Ipswitch File Transfer
CASE STUDY: This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.
Posted: 09 Jul 2013 | Published: 31 May 2013

Ipswitch File Transfer
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info